Posts

Risk information is any information which can influence a decision. Some organisations have a tendency to…

This section outlines two different but complementary types of risk management. Click here…

Microsoft patched 34 vulnerabilities in all on Tuesday with most of the bugs…

A ransomware campaign targeting the Balkans comes with a 96-hour deadline and includes…

There is sometimes a perceived conflict between security and usability. This situation is…

If your code lacks consistency, is poorly laid out and undocumented, you’re adding…

Creating code that is capable of withstanding attack requires an understanding of attack…

Genuine security benefits can only be realised when delivery teams weave security into…

All but the very simplest software is likely to contain bugs, some of…